9
CVE-2025-24936
- EPSS 0.09%
- Veröffentlicht 21.07.2025 06:27:46
- Zuletzt bearbeitet 11.08.2025 14:52:51
- Quelle b48c3b8f-639e-4c16-8725-497bc4
- CVE-Watchlists
- Unerledigt
The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. An attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nokia ≫ Wavesuite Noc Version23.6
Nokia ≫ Wavesuite Noc Version23.12
Nokia ≫ Wavesuite Noc Version24.6 Update-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.257 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9 | 2.3 | 6 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.